Chinese hackers attack the US mainstream media and Twitter

1:20 PM
Chinese hackers attack the US mainstream media and Twitter -

On January 30, The New York Times reported that Chinese hackers had infiltrated its own computers for the last four months, following its report released in late October on the fortunes of the company that the family of Prime Minister Wen Jiabao has developed. The pirates who set the New York Times managed to capture emails and documents Snitching in the emails are the chief Shanghai office, David Barboza, who wrote the report about Wen Jiabao, and the account email from the former head of the Beijing office Jim Yardley, current head of the Office of South Asia in India.

January 31, the Wall Street Journal also reported that its computers had been affected by Chinese cybercriminals and denounced Beijing tries to spy on journalists. The Wall Street Journal said the attacks were "an apparent attempt to control the coverage of China" by its journalists, and suggests that the Chinese practice of spying on the American media had become "a common phenomenon." "It is proved that these efforts are aimed at controlling the infiltration by the media coverage of China, not commercial gain or divert customer information, "said Paula Keve, the Dow Jones agency is also part of tycoon Wall Street Journal News Corp Rupert Murdoch.

We do not know when the attacks against the Wall Street Journal began, but a review of its computer network to improve safety has already begun. "We intend to continue our practice of journalism in a fighter and independent spirit," said Paula Keve.

The same day Saturday, January 31, CNN also announced that the sound system computer international service was blocked for several minutes in response to its report on piracy in the New York Times. "CNNI went black for six minutes" tweeted one of the journalists Hala Gorani of CNN International. "China blocked CNN because of Hala Gorani interviewed on piracy New York Times, "could be read on twitter.

in Beijing, the official response was quick to come." the Chinese authorities have clearly responded to the accusations unfounded the New York Times, "said Hong Lei, spokesman for the Foreign Ministry told reporters." China is also a victim of cyber attacks (...) the Chinese law prohibits such attacks and we hope that all stakeholders adopt a responsible attitude on this issue, "he added.

Last but not least, on Friday, February 1st social network Twitter announced that some of its users have also been victims of cyber attacks that were similar to those made against the New York Times and Wall Street Journal, pointing of the Chinese government finger. Hackers have managed to take names, email addresses, passwords and other data from approximately 250,000 users, said the security director of Twitter, the blog network.

"This attack was not the work of amateurs, and we believe it was not an isolated incident," said the head of Twitter, based in California. "The attackers were extremely sophisticated, and we believe other companies and institutions have recently been attacked in the same way," he added. "We stumbled on an ongoing attack and we can stop later," he said, noting that they were to invalidate some account passwords potentially affected users and asked them to recreate their word pass

Symantec Corporation. - Denounced by the New York Times for not having been able to prevent piracy of its system - said that "advanced attacks, as described by the New York Times, emphasizes how important it is for companies, countries and consumers to ensure that they have taken all possible security. "

VPN technology allows you to establish an encrypted VPN tunnel to a host (or server) on the Internet. So, you can surf anonymously, because it is impossible for others to intercept your traffic through our VPN server. your Internet activity is undetectable! The VPN servers in many different places and you can connect easily. These servers allow you to hide your IP address and other personal information to remain secret, no matter how you are connected.

Previous
Next Post »
0 Komentar